Suppose Alice wants to send encryptions (under a one-time pad) of $m_1$ and $m_2$ to Bob over a public channel. Alice and Bob have a shared key $k$; however, both messages are the same length as the ...

My question might appear the same as the question Taking advantage of one-time pad key reuse?, but actually I did read all the answers and none of them helped me with the details I need.
I am new to ...

So here's the concept. Rather than storing 2 keys and using a random IV, which presents its own problems (key rotation, ensuring no key is used in more than 2^32 cycles, sharing the keys, etc), is it ...

I’m implementing some file encryption module with random-access capability and AES-CTR seems the right way to go.
I understand that reusing Keys and IVs can expose the file to ‘Stream Cipher Attacks’ ...

Many sources mention that IVs must not be reused with the same key in CTR mode, for encrypting 2 different pieces of data, because that totally destroys security - but I haven't found an explanation ...

Given that some signature schemes (for instance Elgamal) use an ephemeral key that cannot be reused ever. How do people usually protect against this?
I'll elaborate more: if you reuse the ephemeral ...

I am implementing a key distribution protocol described by Torben Pedersen in A Threshold Cryptosystem without a Trusted Party (EUROCRYPT'91). In the protocol, the $n$ parties distribute a public key ...

I'm a pentester and currently analysing a web application which are using some strange encryption scheme.
The point is: They encrypt using AES-128, generate a (not cryptographic secure) key and use ...

Preamble
Before I ask this question, please accept that I fully understand that 'rolling your own' is never a good idea, and that I am a relative n00b. The only reason I am doing this the way I am is ...

If an Initialization Vector (IV) is reused (under the same encryption key) in Cipher Feedback Mode (CFB), what is the effect upon security?
I know there is some negative effect upon security, but I ...

The main problem with OTP's is the fact that they can only be used once.
Would it be possible to use a random number that's, say, 512 digits, then use 256 of those for the (non-random) message, the ...

I have used AES to secure my short term wireless network(1 day lifetime). The same symmetric key is used for securing entire network traffic. is it possible to improve security with onetime password ...

I'm looking for a function that is generally one way from some secret $F(s, A) \rightarrow Y$, where $A$ is known, $Y$ is produced (also known), and $s$ is kept secret. But whose repeated application ...

EDIT: This is not a duplicate, in this I have explained WHY this should be secure and not if it is secure, so please stop down-vote if you haven't read everything.
I have questioned before about my ...